PeopleSoft & Social Engineering Attacks: Common Techniques & How to Prevent Them
PeopleSoft & Social Engineering Attacks: Common Techniques & How to Prevent Them
The most damaging breaches tend to be initiated by social engineering. Typically involving an email that invokes urgency, fear, or similar emotions – a victim is prompted to reveal sensitive information or click a malicious link. Given the human element is easy to exploit, these sophisticated tactics have proven to be extremely effective for cyber criminals. Considering the scope that an enterprise organizations (with potentially thousands of employees) can face – the assumption cannot be “if” a breach occurs in this manner, but “when”. And make no mistake, your ERP systems are unequivocally the most popular target for these attacks.
October is National Cyber Security Awareness Month, and in recognition Appsian would like to educate PeopleSoft users on how to better combat social engineering and prevent these attacks from successfully breaching your systems. In this insightful session, PeopleSoft security professionals Greg Wendt and JD Bell will demonstrate how to:
- Apply heightened scrutiny for changes to bank information initiated by employees (seeking to update/change direct deposit credentials.)
- Monitor employee logins that occur outside normal business hours.
- Restrict access to systems handling sensitive information when access is requested outside your secure network
- Embed two-factor authentication within PeopleSoft to restrict access to sensitive systems and information
- Leverage data visualization to execute on-going risk management strategies
Greg Wendt & JD Bell, Appsian